Skip to content

Privacy Overview

Wirebump is a tool for building VPN topologies. It gives you capabilities that were previously difficult or impossible to deploy at the network level. But capabilities are not guarantees.

This page is about being honest about what that means.

Here is something counterintuitive: running complex, obfuscated, multi-hop VPN configurations could make you stand out more, not less.

True anonymity comes from blending into a crowd. The technical term is “anonymity set.” If you are the only person in your city running parallel nested multi-provider multi-hop VPN circuits with DAITA enabled, you are easier to fingerprint, not harder. Your traffic pattern is unique.

If a million people are using a simple Mullvad VPN connection to the same server, finding you in that crowd is difficult. If five people are using your specific exotic configuration, the math changes.

This does not mean sophisticated configurations are worthless. It means you should think about the trade-offs rather than assuming “more complex = more private.”

I do not want to be the only person with a parallel nested multi-provider multi-hop VPN.

I want everyone running this. I want offices and households everywhere operating this way. I want sophisticated VPN configurations to become unremarkable.

Growing the anonymity set benefits everyone, including me. If a thousand people run the same nested Mullvad VPN to Proton VPN circuit, we all become harder to distinguish. If it is only me, the privacy benefit evaporates.

That is why Wirebump is free. Not because it has no value, but because its value increases when more people use it. This is not altruism. It is game theory.

Wirebump is one piece of your privacy architecture.

It is a powerful tool for building VPN topologies at the network level. It handles things that are tedious or impossible to do manually: parallel VPN connections, nested multi-provider circuits, zero-downtime switching, and network-wide traffic shaping.

It sits between your modem and router, protecting every device on your LAN without touching individual endpoints. Your devices do not need special configuration.

For most people, it represents a significant upgrade over their current setup. Even a basic configuration protects you from your ISP logging every connection you make.

Wirebump is not a guarantee of anonymity.

It is not protection against all threats. It is not a replacement for good operational security. It is not magic.

The tool gives you power. How you use that power determines the outcome.

A perfectly configured Wirebump setup will not protect you if you log into your personal Gmail through your “anonymous” circuit. It will not help if you post identifying information. It will not prevent a determined adversary with resources and time from connecting dots across multiple data sources.

No VPN setup protects against these:

Browser fingerprinting. Your browser reveals a surprising amount about your system: screen resolution, installed fonts, WebGL rendering, timezone, language settings. Sophisticated fingerprinting can identify you across sessions and VPN configurations. Use privacy-focused browsers and consider the Tor Browser for sensitive work.

Account logins. If you log into your personal accounts, you have identified yourself. It does not matter how many VPN hops you have. Your identity is now tied to that session.

Behavioral patterns. You browse certain sites at certain times. You have typing patterns. You have interests and habits that create a fingerprint. Changing your exit IP does not change who you are.

Posting identifying information. Metadata in photos, writing style analysis, references to personal details. People dox themselves through content, not network configuration.

Timing correlation. If someone can observe both your home connection and your destination, they can correlate timing even through VPNs. This is a hard problem that VPNs alone do not solve.

Wirebump handles DNS properly to prevent leaks. But the above list is not exhaustive, and the threats evolve.

Some topology configurations may do nothing meaningful for your privacy.

Running traffic through three VPN hops instead of one sounds impressive. But if all three are operated by providers who log, or who can be compelled to cooperate, you have gained complexity without privacy. You may have actually made things worse by creating a more distinctive traffic pattern.

Complexity alone is not security. Sometimes simple and consistent is better than complex and unique.

The configurations that provide real benefits are the ones where:

  • You understand the threat model they address
  • The providers involved have verifiable privacy practices
  • The topology creates actual split knowledge rather than an illusion of it

If you do not understand why a configuration helps, it probably does not help as much as you think.

With all that said, it is hard to imagine a Wirebump configuration that is worse than blasting all traffic straight through your ISP.

Your ISP sees every connection you make. They log it. They sell aggregated data. In some jurisdictions, they hand logs to law enforcement on request. They are the default adversary that everyone should be protecting against.

Even a basic single-provider VPN is an improvement. Your ISP sees encrypted WireGuard traffic going to a VPN endpoint. They do not see the destinations. That alone is valuable.

Wirebump makes it easy to go further: multiple servers for throughput, multiple providers for split knowledge, post-quantum encryption against future decryption. But even the simplest configuration is better than no protection.

The honest assessment: for most people, most of the time, any reasonable Wirebump configuration is a net positive for privacy. The caveats in this document are about preventing overconfidence, not discouraging use.